Secrets Stolen, Fortunes Lost

Preventing Intellectual Property Theft and Economic Espionage in the 21st Century

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Secrets Stolen, Fortunes Lost by Christopher Burgess, SYNGRESS, Richard Power, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Christopher Burgess, SYNGRESS, Richard Power ISBN: 9780080558806
Publisher: Elsevier Science Publication: August 31, 2011
Imprint: Syngress Language: English
Author: Christopher Burgess, SYNGRESS, Richard Power
ISBN: 9780080558806
Publisher: Elsevier Science
Publication: August 31, 2011
Imprint: Syngress
Language: English

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.

Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.

• It’s Not “Someone Else’s” Problem: Your Enterprise is at Risk
Identify the dangers associated with intellectual property theft and economic espionage
• The Threat Comes from Many Sources
Describes the types of attackers, threat vectors, and modes of attack
• The Threat is Real
Explore case studies of real-world incidents in stark relief
• How to Defend Your Enterprise
Identify all aspects of a comprehensive program to tackle such threats and risks
• How to Deliver the Message: Awareness and Education
Adaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

More books from Elsevier Science

Cover of the book Peptide and Protein Vaccines by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book OCEB Certification Guide by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Managing the Web of Things by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Climate Change by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Internationalization and Managing Networks in the Asia Pacific by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Weather Analysis and Forecasting by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Advances in Clinical Chemistry by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Qualitative Research and the Modern Library by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book The Dysregulated Adult by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Laboratory Methods in Enzymology: Protein Part C by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Synthetic Biology by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Synchronous Precharge Logic by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Biopolymer Grafting: Applications by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Treatment of Eating Disorders by Christopher Burgess, SYNGRESS, Richard Power
Cover of the book Handbook of International Economics by Christopher Burgess, SYNGRESS, Richard Power
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy